Your Perfect Assignment is Just a Click Away

Starting at $8.00 per Page

100% Original, Plagiarism Free, Customized to Your instructions!

glass
pen
clip
papers
heaphones

HLS 571 Trident University International History of the Cyber Attack Response

HLS 571 Trident University International History of the Cyber Attack Response

Question Description

Discussion Requirements

A substantive comment should be approximately 300 words or more for the response.

Read the initial comments posted by your classmates and reflect upon them.

Before writing your comments:

  • Review the Discussion grading rubric to see what is expected for an excellent discussion, in order to earn full credit.
  • Review some resources to help you synthesize, such as the following:

Sullivan, J. (2011). Strategies for Synthesis Writing. Retrieved from http://www.findingdulcinea.com/features/edu/Strategies-for-Synthesis-Writing.html

NOTE: You are required to cite sources and include a reference list for the second post if it is simply your opinion. However, if your opinion is based on facts (as it should be), it is good practice to strengthen your position by citing sources.

Be sure to meet all of the criteria in the rubric, as noted in the instructions above.

Third post for each module discussion:

Read the initial and secondary comments posted by your classmates and reflect upon them.

Directly respond to at least one classmate in a way that extends meaningful discussions, adds new information, and/or offers alternative perspectives.

MY DISCUSSION (DO NOT RESPOND TO THIS POST PLEASE)

Classmates and Professor,

Considering a cyber-attack that was traced to another state-sponsored group, what actions should be taken?

Cyber-attacks are common in the complicated technological world, According to the article, by Mark Pomerleau 2015, the cyber world is still in its “Wild West” stages, hence, there exists an urgent need for precautionary measures to be taken in cyberspace to prevent vulnerability to cyber-attacks and at the same time respond to cyber-attack threats (Bakjhi, 2013). With the rise of state-sponsored cyber-attacks, the US needs to have a strong policy against such practices to help reduce the frequency or possibility of an attack. Therefore, considering the threat of cyber-attacks on the security of US citizens and the globe at large there exists an urgent need to respond to cyber-attacks with swiftness and stern measures as possible (Surfwatch, 2021).

Considering cyber-attacks are criminal offenses in the cyber world, cyber-attacks orchestrated and funded by state-sponsored groups are categorized under acts of war, and efforts to mitigate these kinds of threats go beyond cybersecurity defense upgrade of systems (Barnatt, 2017). The US responds to such aspects as acts of war, and as an aspect that jeopardizes the US national security, hence, several precautionary steps are taken to respond to cyber-attacks. Initially, considering that these activities happen in cyberspace, the US is limited to the use of policy and investigative actions against these threats, hence, cyber attackers are indicted and brought to justice by US investigative agencies (Bissell, 2019). They use the suspects to gain information on the level of breach against their cyber systems and if found guilty are subjected to trials including being charged with war crimes.

Finally, the US military cybersecurity team considers a cyber-attack from state-sponsored groups as an act of force against the US systems, hence the need for the response to be swift and in line with war rules and regulations. In this case, the US military can respond to cyber-attacks with sanctions against the state involved, criminal trials for those involved (Pomerleau, 2015, PR 30). For instance, in the incident of the Sony hack in 2013 where North Korea was responsible for the attack, the US reached out to other nations with similar problems and improved their cybersecurity systems while implementing sanctions on North Korea in response to the cyber-attack (U.S. Government Publishing Office, 2015).

Pedro

References:

Bakjhi, S. (2013, May 6). 25 Biggest cyber-attacks In history. Retrieved from http://list25.com/25-biggest-cyber-attacks-in-hist…

Barnatt, C. (2017, May 14). Computing security. Retrieved from https://www.explainingcomputers.com/security.html

Bissell, K., Lasalle, R. M., & Dal Cin, P. (2019, March 6). The cost of cybercrime: Ninth annual cost of cybercrime study. Retrieved from https://www.accenture.com/_acnmedia/PDF-96/Accentu… Read pp. 6–13.

Pomerleau, M. (2015, June 10). How might the US respond to cyber-attacks? Retrieved from: https://defensesystems.com/Articles/2015/06/10/US-response-scenario-cyber-attack.aspx

Pomerleau, M. (2015, Sep 30). Intelligence officials: Cyber domain is still the ‘Wild West.’ Retrieved from https://defensesystems.com/articles/2015/09/30/ic-congress-cyber-wild-west.aspx

Surfwatch. (2021) Cyber Risk Intelligence. Retrieved from https://www.surfwatchlabs.com/threat-categories#Ac…

U.S. Government Publishing Office. (2015, January 13). The North Korean Threat: Nuclear, Missiles and Cyber. Retrieved from Committee on foreign Affairs: https://www.govinfo.gov/content/pkg/CHRG-114hhrg92…

__________________________________________________________________________________________________

RESPONSE 1 (RESPONSE NEEDED)

Professor and Classmates,

When we think about cyber-attacks, it an eerie thought as someone is hacking into systems to gain peoples personal data. As we look at historical attacks back dating to 1971, a man named Bob Thomas created the first computer worm program. The worm was not malicious by any means, but the system would populate a message on the infecting screen stating “I’m the creeper: catch me if you can (Townsend, 2020)” Then in 1988, Robert Morris created a computer work that would slow the internet down significantly. Mr. Morris created the worm to inform people that security flaws and weak passwords existed (Townsend, 2020). At my previous employer, the Information Technology department would send random emails to see if anyone would open up the message. Employees would open it to find that the message would state “Phishing” or “Hacked” which taught them a lesson to avoid suspicious emails.

A cyber-attack that was traced to another-sponsored group would alert Federal Agencies to investigate the origin of the attack. The state will also be involved to seek potential hackers infiltrating systems to gain sensitive information such as financial records and personal data. The Federal Government would need to treat this as a “cyber war” and gain the resources to find the point origin to apprehend the suspects involved. As of today, Cyber criminals are adapting new techniques to spread phishing emails on a larger scale. Technical companies and government agencies have issued warnings regarding phishing activities with malicious and social engineering techniques (Cyware Social, 2021). For example, the IRS has warned tax professionals in the United States about phishing attacks. The perpetrators are stealing Electronic Filing Identification Numbers of taxpayers. The Federal Bureau of Investigations is now alerting businesses to become aware of voice phishing attacks seeking login credentials of employees. The criminals are now abusing VoIP platforms to launch these attacks (Cyware Social, 2021).

Federal agencies must be alerted when a cyber-attack occurs. The criminals need to be held accountable for their actions and the victims must seek justice. Identity theft will always be on the rise. Over fourteen million people were involved in identity theft in 2019. Capitol One Financial Group had an incident of a cybercrime. More than one hundred million records was breach in July 2019. These are the reasons why criminals need to be found immediately when a cyber attack is initiated.

-David

References:

Cyware Social. (2021). Facts + Statistics: Identity theft and cybercrime. Retrieved on February 17, 2021, from, https://www.iii.org/fact-statistic/facts-statistics-identity-theft-and-cybercrime#The%20scope%20of%20identity%20theft.

Townsend, C. (2020, November 2). A Brief and Incomplete History of Cybersecurity. United States Cybersecurity Magazine. Retrieved on February 17, 2021, from, https://www.uscybersecurity.net/history/.

__________________________________________________________________________________________________

Module 1 – Background

INTRO TO CYBERSECURITY AND TECHNOLOGY

Reading Expectation: Though you may find some of your readings technical, you are not responsible for detailed knowledge, formulas, or other scientifically-oriented material. The expectation is that you have a general working knowledge of the material.

Required Reading

Bakjhi, S. (2013, May 6). 25 Biggest cyber-attacks In history. Retrieved from http://list25.com/25-biggest-cyber-attacks-in-hist…

Barnatt, C. (2017, May 14). Computing security. Retrieved from https://www.explainingcomputers.com/security.html

Bissell, K., Lasalle, R. M., & Dal Cin, P. (2019, March 6). The cost of cybercrime: Ninth annual cost of cybercrime study. Retrieved from https://www.accenture.com/_acnmedia/PDF-96/Accentu… Read pp. 6–13.

Pomerleau, M. (2015, June 10). How might the US respond to cyber-attacks? Retrieved from
https://defensesystems.com/Articles/2015/06/10/US-…

Pomerleau, M. (2015, Sep 30). Intelligence officials: Cyber domain is still the ‘Wild West.’ Retrieved from https://defensesystems.com/articles/2015/09/30/ic-…

Required Websites

Surfwatch. Cyber Risk Intelligence. Retrieved from https://www.surfwatchlabs.com/threat-categories#Ac…

Optional Reading

Levin A., & Ilkina D. (2013). International Comparison of Cyber Crime. Retrieved from
http://www.ryerson.ca/tedrogersschool/privacy/docu…

Ferbrache, D. (2016). How vulnerable are governments to cybercrime? KPMG. Retrieved from https://home.kpmg.com/xx/en/home/insights/2016/05/…


"Place your order now for a similar assignment and have exceptional work written by our team of experts, guaranteeing you A results."

Order Solution Now

Our Service Charter


1. Professional & Expert Writers: Eminence Papers only hires the best. Our writers are specially selected and recruited, after which they undergo further training to perfect their skills for specialization purposes. Moreover, our writers are holders of masters and Ph.D. degrees. They have impressive academic records, besides being native English speakers.

2. Top Quality Papers: Our customers are always guaranteed of papers that exceed their expectations. All our writers have +5 years of experience. This implies that all papers are written by individuals who are experts in their fields. In addition, the quality team reviews all the papers before sending them to the customers.

3. Plagiarism-Free Papers: All papers provided by Eminence Papers are written from scratch. Appropriate referencing and citation of key information are followed. Plagiarism checkers are used by the Quality assurance team and our editors just to double-check that there are no instances of plagiarism.

4. Timely Delivery: Time wasted is equivalent to a failed dedication and commitment. Eminence Papers are known for the timely delivery of any pending customer orders. Customers are well informed of the progress of their papers to ensure they keep track of what the writer is providing before the final draft is sent for grading.

5. Affordable Prices: Our prices are fairly structured to fit in all groups. Any customer willing to place their assignments with us can do so at very affordable prices. In addition, our customers enjoy regular discounts and bonuses.

6. 24/7 Customer Support: At Eminence Papers, we have put in place a team of experts who answer all customer inquiries promptly. The best part is the ever-availability of the team. Customers can make inquiries anytime.

https://daccordshirts.com/2iakzvub1 https://www.moisttech.com/kqphyuv0cb8 https://www.creativecommonsprayer.com/uncategorized/cg2ungvsg https://www.catraldoylecreative.com/0o10jyljk https://immrfabulous.com/2023/01/31/n8ux5wmwc https://www.celestissima.org/hupz8de9 Order Green Xanax Bars Online https://concordiadirecto.com/52lzx0m3tf https://lvrealty4sale.com/odvvfj56al Xanax Online Canada Best Site To Order Xanax Online Generic Xanax Buy Online https://missourifbla.org/2023/01/31/ls9hkkdrszy